InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is The Use Of St01? What Are The Return Codes Of T-code St01? |
|
Answer» Transaction CODE ST01 is used to trace the user authorizations. This can be useful if we NEED to check which all the authorizations have been checked in background when any t-code is being EXECUTED by the BUSINESS user. Below are the return codes of ST01 :
Transaction code ST01 is used to trace the user authorizations. This can be useful if we need to check which all the authorizations have been checked in background when any t-code is being executed by the business user. Below are the return codes of ST01 : |
|
| 2. |
How To Create A Query In Sap R/3 System? |
|
Answer» The query can be created and executed using the t-code SQVI:
The query can be created and executed using the t-code SQVI: |
|
| 3. |
What Is Sox (sarbanes Oxley)? |
|
Answer» Sarbanes-Oxley is a US law passed in 2002 to strengthen corporate governance and restore INVESTOR confidence. Act was sponsored by US Senator Paul Sarbanes and US Representative Michael Oxley. The Sarbanes-Oxley Act is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. Sarbanes-Oxley defines which records are to be stored and for how long. The legislation not only affects the financial side of corporations, but also affects the IT departments whose job it is to store a corporation’s electronic records. The Sarbanes-Oxley Act STATES that all BUSINESS records, including electronic records and electronic messages, must be saved for “not less than five years”. The consequences for non-compliance are fines, imprisonment, or both. IT departments are INCREASINGLY faced with the challenge of creating and maintaining a corporate records archive in a cost-effective fashion that satisfies the requirements put forth by the legislation. Organizations should be able to guarantee the integrity of some of their operations like PTP or OTC which can have quiet a significant impact on the way the financial statements are projected if not controlled. Organizations today are thereby moving in direction of automating their SOFTWARES for SOX compliance. A key factor towards achieving SOX compliance is to seperate the duties amongst individuals to such an extent that no one person has the authorization to fulfill a complete cycle say procurement or sales. Sarbanes-Oxley is a US law passed in 2002 to strengthen corporate governance and restore investor confidence. Act was sponsored by US Senator Paul Sarbanes and US Representative Michael Oxley. The Sarbanes-Oxley Act is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. Sarbanes-Oxley defines which records are to be stored and for how long. The legislation not only affects the financial side of corporations, but also affects the IT departments whose job it is to store a corporation’s electronic records. The Sarbanes-Oxley Act states that all business records, including electronic records and electronic messages, must be saved for “not less than five years”. The consequences for non-compliance are fines, imprisonment, or both. IT departments are increasingly faced with the challenge of creating and maintaining a corporate records archive in a cost-effective fashion that satisfies the requirements put forth by the legislation. Organizations should be able to guarantee the integrity of some of their operations like PTP or OTC which can have quiet a significant impact on the way the financial statements are projected if not controlled. Organizations today are thereby moving in direction of automating their softwares for SOX compliance. A key factor towards achieving SOX compliance is to seperate the duties amongst individuals to such an extent that no one person has the authorization to fulfill a complete cycle say procurement or sales. |
|
| 4. |
What Are The Authorization Groups And How To Create Them? |
|
Answer» Authorization groups are the units comprising of tables for COMMON functional area. GENERALLY, each table is assigned to a authorization group due to this reason we NEED to mention the value of authorization group while restricting the ACCESS to table in authorization object S_TABU_DIS. The authorization group can be created by using the t-code SE54. The assignment of tables to authorization group can be CHECKED by using table TDDAT. Authorization groups are the units comprising of tables for common functional area. Generally, each table is assigned to a authorization group due to this reason we need to mention the value of authorization group while restricting the access to table in authorization object S_TABU_DIS. The authorization group can be created by using the t-code SE54. The assignment of tables to authorization group can be checked by using table TDDAT. |
|
| 5. |
What Is The Use Of Authorization Object S_tabu_lin? |
|
Answer» This AUTHORIZATION object is USED to provide the ACCESS to tables on row LEVEL. This authorization object is used to provide the access to tables on row level. |
|
| 6. |
What Is The Use Of Su25 T-code? |
|
Answer» The t-code SU25 is used to copy the data from tables USOBT and USOBX to tables USOBT_C and USOBX_C. Generally, this t-code NEEDS to be executed after the INSTALLATION of SYSTEM upgrade so that the values in customer tables are UPDATED ACCORDINGLY. The t-code SU25 is used to copy the data from tables USOBT and USOBX to tables USOBT_C and USOBX_C. Generally, this t-code needs to be executed after the installation of system upgrade so that the values in customer tables are updated accordingly. |
|
| 7. |
How To Assign The Multiple Roles To More Than 20 Users In One Shot In T-code Su10? |
|
Answer» To perform this mass role ASSIGNMENT, we need to follow below steps in SU10:
To perform this mass role assignment, we need to follow below steps in SU10: |
|
| 8. |
Which Entities Are Not Distributed While Distributing The Authorization Data From Master Role To Derived Roles? |
|
Answer» During the DISTRIBUTION of authorization data from master ROLE to derived roles, Organizational values and user assignment are not distributed. The Org. values and user ASSIGNMENTS are specific to individual roles hence has no bearing on master-derived role RELATIONSHIP. During the distribution of authorization data from master role to derived roles, Organizational values and user assignment are not distributed. The Org. values and user assignments are specific to individual roles hence has no bearing on master-derived role relationship. |
|
| 9. |
How To Assign The Logical System To Client? |
|
Answer» Logical system can be ASSIGNED to client by USING the TC -code SCC4. We NEED to be very careful while doing this change as it can AFFECT the CIA (if configured). Logical system can be assigned to client by using the tc -code SCC4. We need to be very careful while doing this change as it can affect the CIA (if configured). |
|
| 10. |
How To Find User Defined, System Default Values For Security Parameters? |
|
Answer» The values for PARAMETERS can be checked by USING the t-code RSPFPAR. After executing the t-code, GIVEN the parameter name and click on execute. The values for parameters can be checked by using the t-code RSPFPAR. After executing the t-code, given the parameter name and click on execute. |
|
| 11. |
How To Find The Email Ids If Given A List Of Users (say 100)? |
|
Answer» The list of email ids for given USERS can be GENERATED by performing the below steps:
The list of email ids for given users can be generated by performing the below steps: |
|
| 12. |
How To Generate The List Of Roles Having Authorization Objects With Status As “maintained”? |
|
Answer» This list can be GENERATED by USING the table AGR_1251 as below:
This list can be generated by using the table AGR_1251 as below: |
|
| 13. |
How To Check The Transport Requests Created By Other User? |
|
Answer» The t-code SE10 PROVIDE the option to enter the user NAME. By using this FACILITY, we can search the TRANSPORT requests created by other users. The t-code SE10 provide the option to enter the user name. By using this facility, we can search the transport requests created by other users. |
|
| 14. |
How To Find The Transport Requests Containing The Specific Role? |
|
Answer» The list of Transport requests containing the specific role can be RETRIEVED by performing below steps:
The list of Transport requests containing the specific role can be retrieved by performing below steps: |
|
| 15. |
How To Create The User Group In Sap System? |
|
Answer» USER GROUP can be created by performing the below steps:
User group can be created by performing the below steps: |
|
| 16. |
How Many Types Of Tables Exists And What Are They In Data Dictionary? |
|
Answer» 4 types of tables
4 types of tables |
|
| 17. |
What Is The Advantage Of Structures? How Do You Use Them In The Abap Programs? |
|
Answer» GLOBAL EXISTANCE(these COULD be used by any other PROGRAM without creating it again). GLOBAL EXISTANCE(these could be used by any other program without creating it again). |
|
| 18. |
What Is The Typical Structure Of An Abap/4 Program? |
|
Answer» HEADER ,BODY,FOOTER. |
|
| 19. |
What Is The Step By Step Process To Create A Table In Data Dictionary ? |
|
Answer» step 1: CREATING domains(data TYPE, field LENGTH, range). step 2: creating data elements(properties and type for a table field). step 3: creating tables(SE11). step 1: creating domains(data type, field length, range). step 2: creating data elements(properties and type for a table field). step 3: creating tables(SE11). |
|
| 20. |
What Does An Extract Statement Do In The Abap Program ? |
|
Answer» Once you have declared the POSSIBLE RECORD types as field groups and defined their STRUCTURE, you can fill the extract dataset using the FOLLOWING statements: EXTRACT. When the first EXTRACT statement occurs in a program, the system creates the extract dataset and adds the first extract record to it. In each subsequent EXTRACT statement, the new extract record is added to the dataset EXTRACT HEADER. When you extract the data, the record is filled with the current VALUES of the corresponding fields. As soon as the system has processed the first EXTRACT statement for a field group , the structure of the corresponding extract record in the extract dataset is fixed. You can no longer insert new fields into the field groups and HEADER. If you try to modify one of the field groups afterwards and use it in another EXTRACT statement, a runtime error occurs. By processing EXTRACT statements several times using different field groups, you fill the extract dataset with records of different length and structure. Since you can modify field groups dynamically up to their first usage in an EXTRACT statement, extract datasets provide the advantage that you need not determine the structure at the beginning of the program. Once you have declared the possible record types as field groups and defined their structure, you can fill the extract dataset using the following statements: EXTRACT. When the first EXTRACT statement occurs in a program, the system creates the extract dataset and adds the first extract record to it. In each subsequent EXTRACT statement, the new extract record is added to the dataset EXTRACT HEADER. When you extract the data, the record is filled with the current values of the corresponding fields. As soon as the system has processed the first EXTRACT statement for a field group , the structure of the corresponding extract record in the extract dataset is fixed. You can no longer insert new fields into the field groups and HEADER. If you try to modify one of the field groups afterwards and use it in another EXTRACT statement, a runtime error occurs. By processing EXTRACT statements several times using different field groups, you fill the extract dataset with records of different length and structure. Since you can modify field groups dynamically up to their first usage in an EXTRACT statement, extract datasets provide the advantage that you need not determine the structure at the beginning of the program. |
|
| 21. |
What Are The Problems In Processing Batch Input Sessions And How Is Batch Input Process Different From Processing Online ? |
Answer»
PROBLEMS: |
|
| 22. |
What Should Be The Approach For Writing A Bdc Program ? |
|
Answer» STEP 1: CONVERTING THE LEGACY SYSTEM DATA TO A FLAT FILE to internal table CALLED "CONVERSION". STEP 2: TRANSFERRING THE FLAT FILE INTO SAP SYSTEM CALLED "SAP DATA TRANSFER". STEP 3: DEPENDING UPON THE BDC TYPE
STEP 1: CONVERTING THE LEGACY SYSTEM DATA TO A FLAT FILE to internal table CALLED "CONVERSION". STEP 2: TRANSFERRING THE FLAT FILE INTO SAP SYSTEM CALLED "SAP DATA TRANSFER". STEP 3: DEPENDING UPON THE BDC TYPE |
|
| 23. |
Can You Create A Table With Fields Not Referring To Data Elements ? |
|
Answer» YES. eg:- ITAB LIKE SPFLI.here we are referening to a data OBJECT(SPFLI) not data ELEMENT. YES. eg:- ITAB LIKE SPFLI.here we are referening to a data object(SPFLI) not data element. |
|
| 24. |
What Is Sap R/3 ? |
|
Answer» The name SAP a German company is an acronym for "SYSTEME, Anwendungen, Produkte in der Datenverarbeitung." This is TRANSLATED in English as "Systems, Applications, and Products in DATA PROCESSING." The name SAP a German company is an acronym for "Systeme, Anwendungen, Produkte in der Datenverarbeitung." This is translated in English as "Systems, Applications, and Products in Data Processing." |
|
| 25. |
From Hardware Perspective, Every Information System Can Be Divided Into Three Task Areas Presentation? |
Answer»
|
|